WHITE P APER The Network-Enabled Enterprise: Strategic Considerations Sponsored by: Level 3 Communications and Alcatel-Lucent Melanie Posey August 2013 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com EXECUTIVE SUMMARY The digital economy is no longer emerging; it has arrived. The changing nature and velocity of business, the pace of technology innovation, and enterprise IT transformation trends are converging to raise the profile of the network-enabled enterprise. In this new era of highly interdependent business processes, applications, and supply chains, wide area networks (WANs) take on greater importance as the unifying, performance-enhancing element supporting today's technology-dependent business environments. This new era of the network-enabled enterprise brings heightened efficiency and productivity for business operations, but only if corporate WANs are sufficiently dynamic, responsive, and performance oriented to meet the needs of real-time business. ENTERPRISE WAN TRANS FORMATION: SUPPORTING HYBRID IT/NETWORK ENVIRONMENTS Today's enterprise networks must handle more requirements than ever before — but the cost of failure is also greater than it has ever been in the past — and the network lies at the heart of connecting business-critical applications to business growth. In rapidly changing business environments, companies must constantly plan, implement, and execute strategies to grow revenue, improve operational efficiencies, and reduce costs. The technology landscape in which companies operate is becoming more complex. IT initiatives such as datacenter consolidation, IT infrastructure virtualization, and automated, interconnected business process architectures are being implemented. At the same time, emerging applications such as cloud computing, unified communications (UC), video, mobile applications, Big Data, the Internet of Things, bring your own device (BYOD), and social media are being adopted both inside and outside enterprise datacenters. Furthermore, the nature of work is changing as employees and business locations are more dispersed and business ecosystems are expanding to include suppliers, partners, and customers. As shown in Figures 1 and 2, business initiatives drive IT investment and vice versa. Enterprises are looking to cloud services, simplified network structures, virtualization, and application performance technologies to reduce overall corporate costs. Mobility, UC, and cloud services are being enlisted to improve employee productivity. Enhanced data backup/recovery capabilities and WAN security are key network/IT initiatives related to improved business processes and expanded use of Big Data applications. Figure 3 highlights current and planned use of emerging technologies among U.S. enterprises. FIGURE 1 Key Business Initiatives Driving Network/IT Investment over the Next 12 Months Q. Of the following business initiatives, which are the top 3 that will be significant in driving network and IT investments in your organization over the next 12 months? Select up to three items. Improve business processes 49 Reduce overall cost structure 48 Increase employee productivity 46 Expand use of business intelligence/data analytics 29 Update business applications 28 Attract new customers 22 New product/service development 21 Customer retention 19 Expand into new geographies/countries 13 0 10 20 30 40 (% of respondents) 50 60 n = 1,212 Notes: Multiple responses were allowed. Values represent the percentage of respondents ranking each factor number 1, 2, or 3. Source: IDC's 2012 U.S. WAN Manager Survey 2 #242800 ©2013 IDC FIGURE 2 Key Technology Initiatives Currently Driving Business Investment Q. Of the following technology initiatives, which three are the most important to your organization at the moment? Enhance WAN/network security 41 Improve data backup/recovery capabilities 38 Improve perf ormance of business apps 37 Implement a corporate mobile strategy 27 Implement/expand use of cloud services 27 Simplif y WAN/network structure 26 Server/datacenter virtualization 22 Deploy unif ied communications and collaboration (UC&C) 19 Converge voice and data networks onto IP 15 Enable enterprise social networking 9 Put video over the WAN 9 0 5 10 15 20 25 30 (% of respondents) 35 40 45 n = 1,212 Notes: Multiple responses were allowed. Values represent the percentage of respondents ranking each factor number 1, 2, or 3. Source: IDC's 2012 U.S. WAN Manager Survey ©2013 IDC #242800 3 FIGURE 3 Current and Emerging Technology Implementation Q. Are you implementing or do you plan to implement any of the following services or technologies? 31 Unif ied communications 25 Cloud computing used f or IT inf rastructure (IaaS) 21 27 Cloud computing used f or sof tware applications (SaaS) 26 27 41 Videoconf erencing solutions 20 18 Managed mobility 23 0 10 20 30 40 (% of respondents) 50 Use now Plan to use in 12 months n = 1,212 Source: IDC's 2012 U.S. WAN Manager Survey These trends — IT transformation, emerging applications, new technology consumption/delivery models, and highly distributed business ecosystems — result in more traffic running on enterprise WANs, added pressure on the network, and a greater need for network optimization and security solutions. The network-related challenges of technology transformation include the following: Datacenter consolidation, IT virtualization, Big Data/analytics, business continuity/data replication, and virtual machine portability. These initiatives require bigger and more intelligent "east-west" (datacenter-to-datacenter) bandwidth to handle the volume of the traffic flow and the business criticality of the data and applications. Increasingly distributed end users. End users include not only employees in remote offices with wired connections but also on-the-go mobile device users and machine-to-machine "users" who require access to increasingly centralized business applications on-net and off-net (i.e., cloud); "north-south" (datacenterto-branch office) connectivity must keep pace. Real-time, IP-enabled communications and processes. Real-time applications such as voice and video and business-critical applications such as point-of-sale or financial transactions compete for bandwidth on converged networks alongside less critical or delay-sensitive traffic streams. Cloud computing. End-user consumption of external cloud services (whether IT sanctioned or "shadow IT") creates data protection issues as well as identity access, policy management, and quality-of-service (QoS) issues on the network. 4 #242800 ©2013 IDC Modern enterprise networks are highly heterogeneous, featuring complex combinations of the following: IT/application sourcing strategies: In-house, third-party colocation, managed hosting, IT outsourcing, and external cloud services Application performance requirements: Latency and packet loss tolerances, bandwidth needs, and routing imperatives Connectivity types: LAN, WAN, and public Internet; fixed and mobile access End-user devices: Desktops, laptops, smartphones, tablets, wireless terminals, and sensors End-user communities: Employees, customers, partners, and suppliers Highly reliable, secure, and performance-optimized WANs become increasingly important components of enterprise ICT strategies as mission-critical business processes and applications become more network dependent. Adoption of a holistic view that positions IT and networks as interdependent components of next-generation IT/application delivery frameworks is the first step toward becoming a networkenabled enterprise. NEXT-GENERATION APPLICATION -AW ARE DELIVERY NETWORKS: RELIABILITY, PERFORMANCE, AND SEC URITY The expectations of end users who rely on the network to deliver business-critical applications and communications have expanded dramatically in recent years. Inside the network-enabled enterprise, data streams are not just bits and bytes: They are purchase orders, invoices, design specifications, online transactions, and customer service interactions that must flow across the network reliably, securely, and in real time. Network issues that impede access to these applications can translate into diminished employee productivity, disrupted production schedules, lost sales, and customer/line-of-business user dissatisfaction. Security also takes on heightened importance in interconnected business environments. Organizations must protect against targeted Web site attacks, maintain strict controls for access to business-to-business (B2B) and corporate portals, and comply with regulatory mandates related to data protection and information security. Ensuring network reliability and security was difficult enough back when business processes operated within the confines of corporate LANs and private WANs. In nextgeneration enterprise application delivery environments, workloads and application components no longer reside exclusively within the controlled confines of enterprise datacenters and closed corporate networks. Furthermore, convergence in the datacenter, LAN/WAN, and network access domains as well as growing use of externally sourced PaaS, IaaS, and SaaS services ups the ante for network/IT managers who must supply the bandwidth needed to support processing- and storage-intensive workloads and manage the network traffic flows generated by an ever-shifting mix of applications and end users. ©2013 IDC #242800 5 Converged environments require dynamic networks designed to adjust to different application-centric and end user– or device-specific requirements. Not all networkenabled applications are created equal — some are more mission critical, latency sensitive, or bandwidth hungry than others — but all must be network enabled to provide consistent, predictable performance. The first step in building a next-generation application-aware network involves optimal leverage of the various network technologies. The inherent traffic engineering and class-of-service (CoS) capabilities of MPLS-enabled Layer 2 and Layer 3 VPNs facilitate assigning different priorities to different types of network traffic and the ability to dynamically allocate bandwidth among the different CoS designations. Other MPLS attributes, scalability, route management, and any-to-any connectivity position MPLS for use in site-to-site VPNs and converged voice/data/video applications. For some applications, the ubiquity of public IP provides solutions for remote access, large file transfer, and public cloud gateways. Finally, high-performance optical networks provide dedicated large-bandwidth connectivity, low point-to-point latency, and reliability for applications such as datacenter-to-datacenter interconnection, data/storage replication, high-speed transactions (such as algorithmic trading), and business analytics/data mining. However, other tools and techniques are required to fine-tune network traffic flows and optimize applications for network delivery. These tools, collectively grouped under the name WAN optimization, attack performance issues at the data layer (caching, compression, deduplication), the application layer (optimization to overcome the chattiness of certain application protocols), and the transport layer (traffic optimization across multiple transport protocols). Application performance management, a key capability of next-generation WANs, provides a framework for fine-grained network traffic profiling and control, and it enables the visibility and intelligence needed to establish performance thresholds, implement proactive network planning strategies, and make informed network-tuning adjustments. Ongoing initiatives such as software-defined networks (SDNs) and network function virtualization (NFV) will introduce additional traffic management, quality-of-service, and tuning capabilities. CASE STUDIES: WHAT C AN HIGH-PERFORMANCE CONVERGE D NETWORKS DO FOR YOU? High-performance, scalable, and secure WAN environments provide consistent, reliable, and optimized access to a wide range of horizontal business applications such as email, content management, and file storage, which, depending on the industry, may or may not be mission critical. However, across all industries, there are certain business processes in which the speed, reliability, and responsiveness of the network can literally mean the difference between profit and loss, customer retention or churn, and successful or unsuccessful patient outcomes. Examples include: Financial services. High-speed algorithmic trading firms rely on highperformance optical connectivity for linkages to the broad array of ecosystem participants involved in trade execution, including liquidity and execution venues, market data providers, and clearinghouses/settlement houses. In the world of 6 #242800 ©2013 IDC electronic and increasingly automated trading, reliable, high-capacity, and scalable connectivity is a table-stakes requirement for accessing large volumes of data identifying price arbitrage opportunities and executing the trade in the space of milliseconds before the opportunity vanishes. Delays or variable latency at any point in the trading workflow are the make-or-break difference between a winning or losing day in the market. Healthcare. The healthcare industry is in the midst of digital transformation as electronic medical record exchanges, point-of-care information systems, remote diagnostics, medical monitoring devices, and other innovations converge to facilitate "connected healthcare." Hospitals and non-hospital care facilities, healthcare providers, insurance companies, medical device manufacturers, and the life science industry are collaborating to make the delivery of healthcare services more efficient while also containing costs. Scalable networks that can expand rapidly to connect additional locations and end-user devices are vital to the expansion of connected healthcare ecosystems. As more medical information is captured, stored, and exchanged electronically, identity access management and layered security to protect data in flight and at rest are required for regulatory compliance and to promote the use of telemedicine and mobility-based healthcare services. Remote diagnostics for chronic disease management is another healthcare application that requires reliable and secure access and distribution network services. Media and entertainment. Distributed digital workflows for content creation and sourcing, media capture, pre- and post-production, ad insertion, and content distribution are mission-critical elements of media/entertainment companies' supply chains. If the content does not get to where it needs to be, the content owners, aggregators, distributors, and advertisers all take a hit. As media migrates to the Internet, digital media subscription services risk alienating their advertisers and losing paying customers, given that alternative sources of content are only a click away. MAN AGING NEXT -GENERATION NETWORKS: CONSIDERING THE OPTIONS Visibility is a necessary prerequisite for guaranteeing the performance of networkcentric applications, but network/IT managers often don't know what applications are running on the network. Nor is there widespread awareness of how the applications impact the broader network and end-user environments — what the bandwidth requirements are, when new applications are added, how applications interact with each other, and how business processes powered by applications perform on a day-to-day basis. However, without baseline knowledge of traffic flows, usage profiles, and application dependencies, it's impossible to get at the root causes of network performance problems and implement targeted solutions. Intelligence gathering about the applications running on the network and the associated resource utilization levels can be used to benchmark the traffic flows and categorize them based on business criticality or application characteristics as well as establish application-specific performance metrics (delay, packet loss, etc.). This discovery ©2013 IDC #242800 7 process also has a security dimension. Visibility plays an important role in identifying unauthorized applications and users on the network and feeding into policies that establish parameters on acceptable use of corporate network resources and isolating potentially malicious traffic. Network access and control policies inform the security measures, which must be integrated into performance-optimized network management. Performance and security are not mutually exclusive network management objectives. When combined with WAN optimization techniques, security measures and policy controls accelerate productive processes and applications in a manner consistent with business requirements. The WAN optimization tool box provides a variety of levers for fine-tuning network performance: CoS designations, traffic-shaping policies, application prioritization, dynamic bandwidth allocation, and protocol optimization. Correlation of application/process metrics to network resources enables real-time problem detection and resolution. Ongoing monitoring yields trending data that can be applied to remediation of recurring issues; development of proactive, fact-based capacity planning; and setting of performance baselines that can be translated into service-level agreement (SLA) metrics. As networks take on a higher profile in enabling the optimized delivery of enterprise applications and cloud-based solutions, internal network/IT personnel are feeling the pinch. Large companies with the resources to support in-house staff, expertise, and centralized network management systems may be able to undertake comprehensive network management without too much difficulty. However, emerging technologies and the pace of enterprise IT transformation may require a fundamental reworking of the network architecture, which current staff may be not be in a position to undertake. For smaller companies, DIY network design and optimization are typically not options on the table. Businesses of all sizes must balance the increasing cost and effort involved in network enabling the enterprise against other business functions that also require time, resources, personnel, and management attention. A network solutions partner can help ease the strain. Specific benefits of the network partner approach include the following: Sharpened focus on the core business. IT staff in today's enterprises have multiple responsibilities across the networking, IT, and application domains, serving the needs of both individual end users and operational line-of-business units. By working with a network solutions partner, companies can focus (or refocus) on core business priorities, freeing up internal staff to concentrate on managing the application layer, improving existing business processes, and developing new processes that will run even more efficiently on applicationaware networks. Expertise on-demand. Enterprises can tap into their network solution partner's engineering expertise to design finely tuned networks that leverage the latest WAN optimization and application performance management technology and monitoring capabilities. Leveraging the network solution partner for access to the various tools and techniques for network visibility, optimization, and control facilitates a more systematic approach to the increasingly taxing problem of delivering optimized application performance on the network. 8 #242800 ©2013 IDC Positive impact on business operations. Network solutions partners can help companies establish standardized network management processes and best practices for all business locations, ensuring consistent application performance across the organization. Cost control. Running a next-generation application-aware network can be a constant process of moves, adds, changes, and upgrades across the extended enterprise environment. Working closely with a network solutions partner offers enterprises more predictable cost structures made possible through the service provider's economies of scale and dedicated, specialized resources. Agility. As enterprises adopt new business processes at an unprecedented pace, the systems supporting these processes and the business analytics driving operational changes need to evolve just as quickly. A network solutions partner businesses build flexible networks suited to the requirements of the digital economy and provide the professional services resources needed to power the network-enabled enterprise. NETWORK SOLUTIONS PROVIDER SELECTION: KEY DECISION FACTORS The network-enabled enterprise offers a solid foundation for companies looking at technology-driven ways to operate more cost efficiently, improve business processes, increase business productivity, and enhance communication and collaboration throughout the supply chain. Going forward, corporate network/IT departments will be tasked with the procurement, operation, management, and coordination of heterogeneous, application-aware network environments that must meet a diverse array of internal and external business requirements. Next-generation networks, positioned as the federation engine of dynamic IT, play an increasingly important role in delivering high-quality end-user experiences with optimal performance and security for mission-critical business applications. The right network solutions provider can help make the network-enabled enterprise a reality. When evaluating solution providers, buyers should keep in mind the usual selection factors such as industry reputation and growth trajectory, as well as the following: Network reach, density, and penetration. Global access and transport capabilities, national inter-city route diversity, international/inter-regional connectivity, and broad and deep metro area coverage Flexible WAN solutions portfolio. Support for various QoS, performance, reliability, capacity, security, and cost requirements, depending on application and end-user profiles Application performance management solutions. Network/application visibility; assessment and discovery tools; performance monitoring, troubleshooting, and analysis capabilities; and application-level SLAs Network architecture. Edge router density, metro fiber coverage, off-net local loop minimization, and route efficiency ©2013 IDC #242800 9 Cloud ecosystem interconnection. Peering, NNI, and Internet transit relationships with key cloud service providers Dynamic bandwidth options. On-demand burstable capacity and usage-based pricing options On-net cloud applications road map. "Beyond connectivity" business-enabling services such as voice over IP, IP-enabled contact centers, videoconferencing, unified communications, Web site acceleration, content delivery, and content management Network consulting and design services. Professional services–oriented engineering resources that can help enterprises design networks customized to their mission-critical application requirements and optimized to eliminate the network-related issues that can adversely impact application performance Copyright Notice External Publication of IDC Information and Data — Any IDC information that is to be used in advertising, press releases, or promotional materials requires prior written approval from the appropriate IDC Vice President or Country Manager. A draft of the proposed document should accompany any such request. IDC reserves the right to deny approval of external usage for any reason. Copyright 2013 IDC. Reproduction without written permission is completely forbidden. 10 #242800 ©2013 IDC
© Copyright 2026 Paperzz